Curated Video
Risk Management for Cyber Security Managers - Information Security Controls
After learning to classify information differently, we will discuss the kinds of security controls available to us to avoid/control risks.
Curated Video
Risk Management for Cyber Security Managers - Information Classification
In this lesson, you will learn how to classify information to understand how to mitigate risks in the most efficient manner.
Curated Video
Risk Management for Cyber Security Managers - Section Preview-2
This brief section outlines how we will understand what information classification is and how to implement security controls.
Curated Video
Risk Management for Cyber Security Managers - Risk Monitoring
In the final video of this section, we will discuss monitoring risks, how we can go about watching them, and if we can keep a close tab on risks with this process.
Curated Video
Risk Management for Cyber Security Managers - Risk Transference
In this video, we will look at risk transference, the third significant way we can adopt to mitigate cyber risks in an organization.
Curated Video
Risk Management for Cyber Security Managers - Section Preview-1
This video briefly outlines what you will learn in this section.
Curated Video
Risk Management for Cyber Security Managers - Threats and Adversaries
Here, we will discuss the different kinds of threats that you might face as a cyber risk manager.
Curated Video
Risk Management for Cyber Security Managers - Risk Management as a Profession
In this video, the author discusses the pros and cons of risk management as a profession and how to go about it for those interested in this.
Curated Video
Risk Management for Cyber Security Managers - Introduction to the Course
This brief introductory video overviews the course and briefly outlines cyber risk management concepts.
Curated Video
CISSP Crash Course - Secure Coding Guidelines
This video explains the weaknesses in software and API security. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Assess Software Security
This video explains assessing software security and how to audit and log the changes. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Security Controls in the SDLC
This video explains SDLC practices and security controls in the SDLC. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Security in the SDLC
This video explains security in the SDLC, methodologies, and maturity models. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Physical Security and Safety
This video explains KPIS of physical security and safety. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Recovery and Response Strategies
This video explains recovery and response strategies with respect to disasters. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Patch and Vulnerability Management
This video explains the patch and vulnerability management process. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Operate Detective and Preventative Controls
This video explains firewalls and how to operate detective and preventative controls. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Resource Protection
This video explains media management and protection. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Security Operations Concepts
This video explains security operations concepts and separation of duties. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Configuration Management
This video explains configuration management. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Conducting Logging and Monitoring Activities
This video explains logging and monitoring activities as well as incident management steps. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Curated Video
CISSP Crash Course - Security Controls Testing
This video explains security controls testing and network discovery. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on security assessment...
Curated Video
CISSP Crash Course - Authentication System
This video explains the SSO on the Internet and networks, as well as OPENID and OAUTH. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
Curated Video
CISSP Crash Course - Federated Identities
This video explains centralized versus decentralized identities. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access...